Ubuntu 10.04 LTS / 12.04 LTS / 12.10 / 13.04 : php5 vulnerabilities (USN-1905-1)

Ubuntu Security Notice (C) 2013-2014 Canonical, Inc. / NASL script (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing one or more security-related patches.

Description :

It was discovered that PHP incorrectly handled the
xml_parse_into_struct function. If a PHP application parsed untrusted
XML, an attacker could use this flaw with a specially crafted XML
document to cause PHP to crash, resulting in a denial of service, or
to possibly execute arbitrary code. (CVE-2013-4113)

It was discovered that PHP incorrectly handled the jdtojewish
function. An attacker could use this flaw to cause PHP to crash,
resulting in a denial of service. (CVE-2013-4635).

Solution :

Update the affected libapache2-mod-php5, php5-cgi and / or php5-cli
packages.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.9
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 68923 ()

Bugtraq ID: 60731
61128

CVE ID: CVE-2013-4113
CVE-2013-4635